IT Unit 11: Cybersecurity (A2 System vulnerabilities)

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

12th Grade

10 Qs

quiz-placeholder

Similar activities

2.3.1 CSP Vulnerable User

2.3.1 CSP Vulnerable User

11th - 12th Grade

11 Qs

Simulasi & Komunikasi Digital

Simulasi & Komunikasi Digital

10th - 12th Grade

15 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Cybersecurity

Cybersecurity

12th Grade

10 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

9th Grade - University

10 Qs

Physical Security

Physical Security

1st Grade - University

10 Qs

Unit 3 - 4.1.4 Application Security

Unit 3 - 4.1.4 Application Security

9th Grade - University

10 Qs

Cybersecurity Semi- Final

Cybersecurity Semi- Final

12th Grade

10 Qs

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ralph Ellis

Used 42+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Potential source(s) of network vulnerabilities

Network ports

USB drives

Poorly managed file permissions and privileges

Failing to enforce a password policy

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Port number used for HTTP?

80

443

418

27

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of organisational vulnerabilities

Network ports

USB drives

Poorly managed file permissions and privileges

Failing to enforce a password policy

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of software vulnerabilities

Downloading software from untrustworthy sources

SQL injection

Zero-day vulnerabilities

Failing to enforce a password policy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Continuing to use an older operating system, well after it is no longer being supported by the developer is an example of which type of vulnerability?

Operating system vulnerability

Software vulnerability

Network vulnerability

Organisational vulnerability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The largest vulnerability for mobile devices...

The time it takes for the original equipment manufacturer (OEM) to update that system software

Hackers accessing the mobile network signal.

Failure to support CSMA with RTS/CTS

Users' inability to secure their own deceives with passcodes.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Examples of physical vulnerabilities

Downloading software from untrustworthy sources

Theft of equipment

Social engineering

Failing to enforce a password policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?